He’s said that Facebook’s free internet project, Internet.org, want to muscle in on Europe. He said: ”Yes, we want to bring Internet.org [everywhere] where there are people who need to be connected. We’re starting off by prioritizing the countries with the most unconnected people and by working with network operators and governments who are most excited about working with Internet.org to get everyone online in their countries.”
The service has already launched in India, Kenya, Zambia, Colombia and Tanzania and, in the Q&A, one person said that the service wasn’t very good, to which Zuck replied: “Having some connectivity and some ability to share is always much better than having no ability to connect and share at all”.
As long as Zuckerberg can get his hands on all that lovely personal data, which makes him so dazzlingly wealthy, the quality of the service is a mere by-product.
He also spoke about Oculus VR: “Our mission [is] to give people the power to experience anything. Even if you don’t have the ability to travel somewhere, or to be with someone in person, or even if something is physically impossible to build in our analog world, the goal is to help build a medium that will give you the ability to do all of these things you might not otherwise be able to do.”
People who like watching dirty films on the internet, take note.
These small extensions can be helpful additions to Chrome and Firefox when it comes to browsing, but some of them were problematic when you get under the hood of them. Google teamed-up with the University of California to analyse and nix a number of these apps.
They found that 5% of everyone visiting a Google page have at least one malicious extension, and most of those have a number of add-ons which are malicious.
One of the problems, according to researcher Alexandros Kapravelos, is that the dodgy extensions use the same techniques to collect your data as the legit ones.
“Even when we have a complete understanding of what the extension is doing, sometimes it is not clear if that behaviour is malicious or not,” he said. “You would expect that an extension that injects or replaces advertisements is malicious, but then you have AdBlock that creates an ad-free browsing experience and is technically very similar.”
In a Facebook post, UK culture secretary Sajid Javid said that, if the Conservatives are elected, they will “legislate to put online hardcore pornography behind effective age verification controls”.
Of course, they’ve got kids in mind when they talk about online porn*.
So how would it work? Well, they might use a third-party to verify all the ages or maybe even create a new form of digital ID. Both will invariably be unpopular and the whole thing is likely to be useless too, as these systems would need the dirty sites themselves to sign-up to such a thing. UK ISPs will be asked to block access to websites that don’t comply with the governments weird fascination with smutty films.
It seems the Tories really want to creep up to you and start all that “wink-wink, nudge-nudge” business, by asking you if you want to watch porn in the privacy of your own home.
(*We mean shielding their little eyes from it, we’ve not idea what you inferred from that sentence)
Pardon? Well, a group called Safari Users Against Google’s Secret Tracking (which has the frankly rubbish aconym of SUAGST) want to sue the internet behemoth in the English courts over what they claim are Google bypassing security settings to track them online.
Three appeal judges have dismissed Google’s appeal against a High Court ruling and ruled that claims for damages can be brought over the allegations of Google’s misuse of private information.
The Safari Users say that Google’s “clandestine” tracking and collation of internet usage (between the summer of 2011 and early 2012) led to distress and embarrassment among UK users. You might not remember that, because as a BW reader, you’re in a constant state of embarrassment and distress, so all the years roll into one.
Anyway, the group say that Google collected private info through cookies, without their information.
Dan Tench, a partner at law firm Olswang, who are representing the group, said this case decides “whether British consumers actually have any right to hold Google to account in this country”. Tench added: ”This is the appropriate forum for this case – here in England where the consumers used the internet and where they have a right to privacy.”
Lord Dyson, Master of the Rolls, and Lady Justice Sharp said in their joint judgement, with which Lord Justice McFarlane agreed: “On the face of it, these claims raise serious issues which merit a trial. They concern what is alleged to have been the secret and blanket tracking and collation of information, often of an extremely private nature… about and associated with with the claimants’ internet use, and the subsequent use of that information for about nine months.”
“The case relates to the anxiety and distress this intrusion upon autonomy has caused.”
Everyone is looking at Lizard Squad, who hacked Xbox as well as Lenovo. They’ve got previous with Twitch as well, when they carried out a DDoS attack, which was only resolved when (get this) four Twitter users gave in to the Squad’s demands to post selfies with “Lizard Squad” daubed on their foreheads.
However, this latest hack doesn’t look like the handiwork of Lizard Squad because, mainly, they crow about their actions very readily and they’re not really about stealing personal information, which is what’s happened here.
It appears that login details, passwords and some credit card information has been stolen in this particular hack. Twitch themselves have confirmed the hack, saying that all users will be forced to reset their passwords. They said: “For your protection, we have expired passwords and stream keys and have disconnected accounts from Twitter and YouTube. As a result, you will be prompted to create a new password the next time you attempt to log into your Twitch account.”
There’s no word on just how many people have been affected by this, but seeing as Twitch has over 45 million monthly viewers and in advance of 1 million people streaming videos, it is likely that this’ll be a large number of people who have had their security breached.
Twitch say that they’ve warned users and told them that the information that may have been swiped includes usernames, email addresses, the IP addresses from where people last logged in, credit card types, truncated card numbers and expiration dates, first and last names, phone numbers, home addresses, and dates of birth.
If you’re a Twitch user, it’d be worth changing the password for any sites you use that has a similar password to the one you use with this lot.
A lot of people don’t like the power Google have online, and this won’t help the internet giant any further.
If you have an Android phone and a Google account, then you might have been tracked without you knowing. Now, this’ll be old news to some, but it seems like there’s a good number of people out there who still have no idea.
Not to worry though – you can stop being tracked really easily
First off, watch this short video which tells you about how you’re being tracked and how you can see where you’ve been – provided you had your phone in your pocket – via a section on Google Maps.
As you can see, you can go back in time and see where you’ve been on a Google Map, which may well give you the willies, but it is easy enough to fix.
First off, you should switch your location services off on your mobile. You’ll find that in your settings. Some apps ask you to turn your location on, but you don’t have to. Twitter doesn’t need to know where you are and if you’re using something like Tinder which requires your location to show you who wants to hump nearby, then only switch your location on when it is needed.
As the video shows, it is really easy to delete your location history, and you can find out more on that, here.
A plan by David Cameron to block and ban encryption has been found to be a rubbish idea, according to a study by the UK parliament.
This report, carried out by the Parliamentary Office of Science and Technology, had a look at how the darknet (or Tor if you prefer) and online anonymity is being used. There’s little public support for it and the Darknet and Online Anonymity report (.pdf link here) noted that it is used by criminals, but it is also used by journalists and whistleblowers and journalists, so if you’re going to look at the ills, you have to weigh-up the pros too.
“There is widespread agreement that banning online anonymity systems altogether is not seen as an acceptable policy option in the UK. Even if it were, there would be technical challenges,” it said.
One thing the report pointed out, was that one place doing this was China, and their governments attempts to squash communications is not something that would be good for the UK.
The report continued, for those who understand the jargon: ”Some argue for a Tor without hidden services because of the criminal content on some THS. However, THS also benefit non-criminal Tor users because they may add a further layer of security.”
“If a user accesses a THS the communication never leaves the Tor network and the communication is encrypted from origin to destination. Therefore, sites requiring strong security, like whistleblowing platforms, are offered as THS. Also, computer experts argue that any legislative attempt to preclude THS from being available in the UK over Tor would be technologically unfeasible.”
Whether or not David Cameron listens to this report is quite another matter.
Another day, another attack on people using gadgets to get on the internet. This time, something called Freak Attack (which sounds like an ace ’80s horror b-movie) is causing a headache for users of Android and Apple devices.
The good news is that there are no reports of this weakness being exploited (yet) and that the relevant companies are working quickly to shore up the flaw… but where has all this come from? Well, researchers reckon that the problem comes from code that came about from old government policies which required software developers to use weaker security in encryption programmes, thanks to that old chestnut of ‘international security concerns’.
The flaw is to do with web encryption technology, which could potentially enable bad people to spy on what you’re doing if you use Safari or Google’s Android browser.
Around a third of all encrypted sites were vulnerable as of yesterday, as sites continued to accept this weaker software, which affects Apple’s browsers, the Android browser, but not Google Chrome browser or the latest versions from Firefox or Microsoft.
Apple and Google have both said that they’ve fixed the Freak Attack flaw, with Apple rolling theirs out next week and Google saying that they’ve sent out the goods to device makers and wireless carriers.
Obviously, this highlights the problems with governments interfering with encryption codes, even when dealing with national security. This old policy has come back to bite it on the arse, as it could well do the opposite of what it was intended to do, and actually give a helping hand to criminals.
Until a rollout occurs, you’d be wise to use Chrome, Firefox or Microsoft’s browser or, indeed, ride your luck until the new security measures are in place, if you’re feeling saucy.
Those irritating gits who run companies that mither everyone with nuisance calls and texts are looking at some new regulations that will slap them with huge fines. We’re talking penalties of (up to, of course) £500,000.
The current laws don’t do much to discourage these spam merchants, but that’s apparently going to change, as new rules will make it much easier to penalise them.
They come into play from April 6th and they mean that the Information Commissioner’s Office (ICO) won’t have to prove that unwanted messages are causing a “substantial damage or substantial distress” any more.
In addition to that, the Government are also looking at bringing in new rules which will see that executives on the board of these businesses will also be held responsible for these calls and messages.
“For far too long companies have bombarded people with unwanted marketing calls and texts, and escaped punishment because they did not cause enough harm,” said digital economy minister Ed Vaizey. “This change will make it easier for the Information Commissioner’s Office to take action against offenders and send a clear message to others that harassing consumers with nuisance calls or texts is just not on.”
We all know how slippery these cold-callers are, so it would be wise to avoid holding your breath until we actually see someone getting a massive fine. Still, this is, initially, very good news for everyone.
According to Sky News, the company called PaymyPCN.net, which has collected penalty charges for two decades has a direct link to the Driver and Vehicle Licensing Agency (DVLA) database, which means people who shouldn’t be looking, can see drivers’ names and addresses.
Not only that, there’s public access to the content of emails that are appealing charges and photos of drivers and the cars. In addition to all that, this database allows the aforementioned photos to be uploaded and deleted, which is just magic.
How did this all come about? Well, a link to all that lovely data was published on Twitter by Michael Green after a private parking firm sent it to someone in error.
Green said: “I am not surprised by this. The DVLA claims to have safeguards in place to ensure drivers’ details are safe but these only exist as media soundbites. Our campaign challengethefine.com aims to get people compensated for parking data breaches. Despite the RAC Foundation questioning the legality of these charges the DVLA still passes millions of details on to private firms.”
Of course, this is the DVLA that have come under heavy fire for their collective failure to vet and audit the companies in which they are prepared to sell the names and addresses of motorists, so this latest news isn’t a shock at all. This is also the same DVLA who have been acting unlawfully when it comes to losing your letters that you’ve sent them (and here’s what you can do if the DVLA say they’ve lost your letter).
A DVLA spokeswoman said: “This is not a DVLA error. We take our duty to safeguard data very seriously and we will not compromise data security. DVLA does not hold or provide data such as photographs, emails and phone numbers to private parking companies.”
As for PayMyPCN – if you want to get in touch with them to see about data breaches, here’s the number to call and their email: Tel: 03450 737 209, firstname.lastname@example.org.
American and British intelligence agencies have been up to no good. They’ve been hacking, illegally, into SIM cards to steal codes so they can try to listen in on people’s calls, according to reports.
This, like all scary spy and surveillance news, has trickled out from the infamous former American intelligence contractor, Edward Snowden.
Spies hacked the SIMs of a company called Gemalto who, as you can imagine, are pretty furious about all this as they operate in 85 different countries and they’d rather not be thought of as complicit in all of this.
The Intercept are calling this “the great Sim heist” and that surveillance agencies were given “the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data”. Some of the mobile networks that are clients of Gemalto include T-Mobile, AT&T, Verizon and “some 450 wireless network providers around the world”.
The source also claims that this hack was organised by Britain’s GCHQ and America’s NSA and that, the hack resulted in the ability to unscramble calls, texts and emails from the decode data that is flung through the air between phones and cell towers. It has also been claimed that Gemalto employees were cyber-stalked and their emails were tapped into so agencies could steal encryption keys.
A Gemalto spokeswoman said: “We take this publication very seriously and will devote all resources necessary to fully investigate and understand the scope of such highly sophisticated techniques to try to obtain Sim card data.”